Extreme Networks Summit WM User Manual page 319

Table of Contents

Advertisement

Term
SSH
SSID
SSL
Subnet mask
Subnets
SVP
Summit WM User Guide, Software Version 5.3
Explanation
Secure Shell, sometimes known as Secure Socket Shell, is a Unix-based
command interface and protocol for securely getting access to a remote
computer. SSH is a suite of three utilities - slogin, ssh, and scp - secure
versions of the earlier UNIX utilities, rlogin, rsh, and rcp. With SSH
commands, both ends of the client/server connection are authenticated
using a digital certificate, and passwords are protected by being encrypted.
Service Set Identifier. A 32-character unique identifier attached to the
header of packets sent over a Wireless LAN that acts as a password when a
wireless device tries to connect to the Basic Service Set (BSS). Several BSSs
can be joined together to form one logical WLAN segment, referred to as
an extended service set (ESS). The SSID is used to identify the ESS.
In 802.11 networks, each Access Point advertises its presence several times
per second by broadcasting beacon frames that carry the ESS name (SSID).
Stations discover APs by listening for beacons, or by sending probe frames
to search for an AP with a desired SSID. When the station locates an
appropriately-named Access Point, it sends an associate request frame
containing the desired SSID. The AP replies with an associate response
frame, also containing the SSID.
Some APs can be configured to send a zero-length broadcast SSID in
beacon frames instead of sending their actual SSID. The AP must return its
actual SSID in the probe response.
Secure Sockets Layer. A protocol developed by Netscape for transmitting
private documents via the Internet. SSL works by using a public key to
encrypt data that's transferred over the SSL connection. URLs that require
an SSL connection start with https: instead of http.
SSL uses a program layer located between the Internet's Hypertext Transfer
Protocol (HTTP) and Transport Control Protocol (TCP) layers. The "sockets"
part of the term refers to the sockets method of passing data back and forth
between a client and a server program in a network or between program
layers in the same computer. SSL uses the public-and-private key
encryption system from RSA, which also includes the use of a digital
certificate.
SSL has recently been succeeded by Transport Layer Security (TLS), which
is based on SSL.
(See netmask)
Portions of networks that share the same common address format. A
subnet in a TCP/IP network uses the same first three sets of numbers (such
as 198.63.45.xxx), leaving the fourth set to identify devices on the subnet. A
subnet can be used to increase the bandwidth on the network by breaking
the network up into segments.
SpectraLink Voice Protocol, a protocol developed by SpectraLink to be
implemented on access points in order to facilitate voice prioritization over
an 802.11 wireless LAN that will carry voice packets from SpectraLink
wireless telephones.
319

Advertisement

Table of Contents
loading

Table of Contents